[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]
COMMUNIST CHINESE CYBER-ATTACKS,
CYBER-ESPIONAGE AND THEFT OF AMERICAN TECHNOLOGY
=======================================================================
HEARING
BEFORE THE
SUBCOMMITTEE ON OVERSIGHT AND INVESTIGATIONS
OF THE
COMMITTEE ON FOREIGN AFFAIRS
HOUSE OF REPRESENTATIVES
ONE HUNDRED TWELFTH CONGRESS
FIRST SESSION
__________
APRIL 15, 2011
__________
Serial No. 112-14
__________
Printed for the use of the Committee on Foreign Affairs
Available via the World Wide Web: http://www.foreignaffairs.house.gov/
----------
U.S. GOVERNMENT PRINTING OFFICE
65-800 PDF WASHINGTON : 2011
For sale by the Superintendent of Documents, U.S. Government Printing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800;
DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC,
Washington, DC 20402-0001
COMMITTEE ON FOREIGN AFFAIRS
ILEANA ROS-LEHTINEN, Florida, Chairman
CHRISTOPHER H. SMITH, New Jersey HOWARD L. BERMAN, California
DAN BURTON, Indiana GARY L. ACKERMAN, New York
ELTON GALLEGLY, California ENI F.H. FALEOMAVAEGA, American
DANA ROHRABACHER, California Samoa
DONALD A. MANZULLO, Illinois DONALD M. PAYNE, New Jersey
EDWARD R. ROYCE, California BRAD SHERMAN, California
STEVE CHABOT, Ohio ELIOT L. ENGEL, New York
RON PAUL, Texas GREGORY W. MEEKS, New York
MIKE PENCE, Indiana RUSS CARNAHAN, Missouri
JOE WILSON, South Carolina ALBIO SIRES, New Jersey
CONNIE MACK, Florida GERALD E. CONNOLLY, Virginia
JEFF FORTENBERRY, Nebraska THEODORE E. DEUTCH, Florida
MICHAEL T. McCAUL, Texas DENNIS CARDOZA, California
TED POE, Texas BEN CHANDLER, Kentucky
GUS M. BILIRAKIS, Florida BRIAN HIGGINS, New York
JEAN SCHMIDT, Ohio ALLYSON SCHWARTZ, Pennsylvania
BILL JOHNSON, Ohio CHRISTOPHER S. MURPHY, Connecticut
DAVID RIVERA, Florida FREDERICA WILSON, Florida
MIKE KELLY, Pennsylvania KAREN BASS, California
TIM GRIFFIN, Arkansas WILLIAM KEATING, Massachusetts
TOM MARINO, Pennsylvania DAVID CICILLINE, Rhode Island
JEFF DUNCAN, South Carolina
ANN MARIE BUERKLE, New York
RENEE ELLMERS, North Carolina
VACANT
Yleem D.S. Poblete, Staff Director
Richard J. Kessler, Democratic Staff Director
------
Subcommittee on Oversight and Investigations
DANA ROHRABACHER, California, Chairman
MIKE KELLY, Pennsylvania RUSS CARNAHAN, Missouri
RON PAUL, Texas DAVID CICILLINE, Rhode Island
TED POE, Texas KAREN BASS, California
DAVID RIVERA, Florida
C O N T E N T S
----------
Page
WITNESSES
Pat Choate, Ph.D., director, Manufacturing Policy Project........ 5
Mr. Richard Fisher, senior fellow, Asian Military Affairs,
International Assessment and Strategy Center................... 11
The Honorable Edward Timperlake (former Director, Technology
Assessment, International Technology Security, Office of the
Secretary of Defense, U.S. Department of Defense).............. 25
Adam Segal, Ph.D., senior fellow, Council on Foreign Relations... 35
LETTERS, STATEMENTS, ETC., SUBMITTED FOR THE HEARING
Pat Choate, Ph.D.: Prepared statement............................ 7
Mr. Richard Fisher: Prepared statement........................... 13
The Honorable Edward Timperlake: Prepared statement.............. 27
Adam Segal, Ph.D.: Prepared statement............................ 37
APPENDIX
Hearing notice................................................... 50
Hearing minutes.................................................. 51
COMMUNIST CHINESE CYBER-ATTACKS, CYBER-ESPIONAGE AND THEFT OF AMERICAN
TECHNOLOGY
----------
FRIDAY, APRIL 15, 2011
House of Representatives,
Subcommittee on Oversight and Investigations,
Committee on Foreign Affairs,
Washington, DC.
The committee met, pursuant to notice, at 12 o'clock p.m.,
in room 2172 Rayburn House Office Building, Hon. Dana
Rohrabacher (chairman of the subcommittee) presiding.
Mr. Rohrabacher. I call to order the Subcommittee on
Oversight and Investigations of the House Foreign Affairs
Committee.
I would like to thank all of you for joining us today. And
today we are examining the Communist Chinese cyber-attacks,
espionage and theft of American technology.
We will proceed with our opening statements and then
introduce the witnesses. And, hopefully, there will be a vote
coming up I am afraid, but let us hope we get through the
testimony of the witnesses and then we will go and vote and
come back and ask the questions.
So, starting off with a Reuters news story this morning
reveals that secret U.S. State Department cables trace computer
system attacks colorfully code named the Byzantine Hades by
U.S. investigators. They have traced these to the Chinese
military itself. An April 2009 cable even pinpoints the attacks
to a specific unit of the Chinese People's Liberation Army.
According to U.S. investigators China has stolen terabytes of
sensitive data from password for State Department computers to
designs for multi-billion dollar weapon systems.
The United States is under attack.
Cyber-attack and cyber-espionage traced backed to China
have been dramatically increasing every year. What kind of
damage is being done? How is our national security being
compromised? Well shielding our digital infrastructure from
attacks, and protecting the intellectual property and
classified information is strategically important to our
national security. But how do that and what else needs to be
done in terms of protecting this?
The Communist Chinese Government has defined us as the
enemy. It is buying, building and stealing whatever it takes to
contain and destroy us. Again, the Chinese Government has
defined us as the enemy.
Chinese cyber-attacks on U.S. assets now number in the
thousands every year. The 2009 report on ``China's Military
Power'' published by the Office of the Secretary of Defense
notes that, ``numerous computer systems around the world,
including those owned by the United States Government,
continued to be a target of intrusion that appears to have
originated within the PRC,'' end of quote. One of the high
value targets that Chinese cyber warriors have repeatedly
attacked is the F-35 Joint Strike Fighter program which is the
centerpiece of future American air power capabilities.
The heavy use of outsourcing of computer and consumer
electronic production to China, not only by American but also
by Japanese, Taiwanese, German, and South Korean firms, has
helped create a Chinese cyber threat that now compromises the
security of the Western world. Beijing has been given
technology and a manufacturing base, making Western networks
vulnerable to escalating Chinese capabilities.
The Office of the Secretary of Defense in their 2010 annual
report to Congress, which was the ``Military and Security
Developments Involving the People's Republic of China''
outlined this challenge. And I quote,
``The PRC utilizes a large well-organized network of
enterprises, defense factories and affiliated research
institutes and computer network operations to
facilitate the collection of sensitive information and
export-controlled technology.''
The Chinese often use, and here it is, the term ``patriotic
hacker'' as a cover for their activities, as well as of course
corporate spies. But in that dictatorship the line between
state and private efforts is blurred intentionally to give
Beijing plausible deniability.
Chinese thinking is based on slogans such as ``Give
Priority to Military Products,'' and ``Combine the Military
with the Civil.'' Thus, economic and commercial spying and
theft are most frequently connected with tech-heavy industries
deemed to be strategic to the regime. This includes computer
software and hardware, biotechnology, aerospace,
telecommunications, transportation, engine technology,
automobiles, machine tools, energy, materials and coating.
A new study by the RAND Corporation, which it was ``Ready
for Takeoff: China's Advancing Aerospace Industry,'' that
report found, and I quote,
``China's aerospace industry has advanced at an
impressive rate over the past decade, partly due to the
increasing participation of its aerospace industry in
the global commercial aerospace market and the supply
chains of the world's leading aerospace firms . . .
China's growing civilian aerospace capabilities are
unquestionably contributing to the development of its
military aerospace capabilities.''
Combine these commercial transfers with the espionage
committed against American military programs like the F-35, and
no one should be surprised by the roll out of the new J-20
``stealth'' Chinese airplane last January. It was years ahead
of what all the experts predicted that China was able to do on
its own.
It is what happens during ``peace time'' that determines
the balance of power and governs the outcome when that peace
breaks down. National security must be a constant concern.
Battleships and mass armies were left behind by aircraft
carriers and rockets. Now we must understand that today's
threat emanating from cyberspace and technology transfers as
well as from traditional practices of espionage.
Today we have before us four experts on the connection of
technology transfers and national power in a competitive world.
Mr. Pat Choate is currently the director of the
Manufacturing Policy Project, a private, nonprofit institution.
Mr. Choate has written widely and several books, including
``Agents of Influence'' and the ``The High Flex Society,''
which document the decline in America's competitiveness and the
influence of foreign powers right here in Washington, DC.
Mr. Richard Fisher is a senior fellow with the
International Assessment and Strategy Center. He is an active
writer and a scholar on China having worked for the Jamestown
Foundation, the Center for Security Policy, and The Heritage
Foundation. He is the author of ``China's Military
Modernization, Building for Regional and Global Reach,'' and
has been published in numerous newspapers and professional
journals.
Mr. Edward Timperlake served as Director of Technology
Assessment, International Technology Security for the
Department of Defense from 2003 to 2009. He identified and
protected the Defense Department from espionage, that was his
job and we're anxious to hear more about that. He also served
as the Department of Defense's representative to the National
Counterintelligence Executive Committee. Before that he
graduated from the Naval Academy and served as a Marine fighter
pilot, as my dad did for 23 years. And co-authored the book,
``Showdown: Why China Wants War with the United States.''
And finally, we have Mr. Adam Segal, a senior fellow with
the Council on Foreign Relations and an expert on security
issues and China policy. He has recently written a book
entitled, ``Advantage: How American Innovation Can Overcome he
Asian Challenge.'' He has taught Vassar College and Columbia
University. He holds a Ph.D. from Cornell.
I want to thank all my witnesses, or our witnesses for
being here today.
And now we'll have opening remarks from our members, and
then we will proceed with your testimony.
Mr. Carnahan.
Mr. Carnahan. Thank you, Mr. Chairman for holding this
hearing. And I want to compliment on the interesting and timely
subjects that you have brought to this subcommittee. And we
look forward to continuing this work together.
As the U.S. economy continues to recover, we must do
everything we can to create jobs here at home and support
domestic manufacturing.
As of 2010, China was the world's third largest buyer of
products from my home state of Missouri ranging from machinery,
pharmacueticals, agriculture products. We experienced a 43-
percent growth in exports from Missouri to China. Nearly $1
billion sales last year alone. Missouri made products exported
to China that are creating jobs here at home in the midwest and
beyond.
With nearly 20 percent of the world's population, the
Chinese market represents an opportunity for American business
to create job here at home by making American products at home
and exporting them to China, but here's the ``but.'' This
growth, while it is an opportunity, it cannot and will not
reach its full potential so long as American companies remain
at risk. Given the long running efforts to illicitly acquire
technology from Western companies, and a lack of protection of
intellectual property rights there is a significant limitation
to the export growth potential of U.S. corporations.
While it is in our economic and security interest clearly
to counter any and all of these issues, it is also in China's
best interest to come to the table and address them in a
serious way. China itself is increasingly susceptible to
hacking and cyber crime and theft of intellectual property by
others around the world, especially given that its technology
is not as superior as ours. It is in the best interest of both
countries to diplomatically address these issues and encourage
Chinese officials to come to the table to do just that: Address
these issues in a serious way.
I look forward to hearing from our witnesses today. And I
yield back, Mr. Chairman.
Mr. Rohrabacher. Thank you very much.
And we have with us, I am going to see if I am pronouncing
right, David Cicilline?
Mr. Cicilline. Yes.
Mr. Rohrabacher. And you're from Rhode Island. And we would
recognize you for an opening statement.
Mr. Cicilline. Just thank you, Mr. Chairman. I just would
like to welcome the witnesses and thank the chairman for
scheduling this hearing.
This issue of how do we support American manufacturers and
deal with the very real issue of the theft in intellectual
property is of great interest to me and to my constituents, and
to our country. And I am particularly also interested in
hearing the witnesses' testimony on what we might do to further
enhance cyber security.
So, I welcome you and thank you for being here today.
Mr. Rohrabacher. Thank you very much. Welcome to the
subcommittee.
Mr. Choate?
Mr. Choate. Mr. Chairman, members----
Mr. Rohrabacher. I am sorry. I was trying to figure out how
to pronounce his name so much that I did not even see him
there.
And another one of our new members, Ms. Bass. No, if you
have an opening statement, please feel free.
Ms. Bass. Thank you for holding this hearing. And I am also
very interested in the testimony that you have to say, and a
particular interest, I mean in addition to the cyber-attacks,
is the whole idea of the problem in China with piracy. I know
that is not the topic today, but hopefully in a future hearing
we will be addressing that.
Mr. Rohrabacher. Thank you very much.
You have a very easy name to pronounce. All my life with a
name Rohrabacher I have got to pay attention to pronunciations.
Mr. Choate, go right ahead.
STATEMENT OF PAT CHOATE, PH.D., DIRECTOR, MANUFACTURING POLICY
PROJECT
Mr. Choate. Thank you, Mr. Chairman, members of the
committee.
Let me focus my comments on how the United States actually
facilitates such cyber-espionage and talk about things that we
can do here at home in dealing with it.
Chinese cyber-attacks, of course, are massive, there have
been numerous studies that have identified these attacks. We
know that all of our major agencies, corporations, banks,
research and other entities are subject to these attacks.
The greatest concentration of technology, of new
technologies, advanced technologies in the world is at the U.S.
Patent Office. What we have is deg.each year is
500,000-plus applications from around the world, about half of
those applications are foreign-based but half are from the
United States, seeking a patent. And at the Patent Office what
we have is a situation in which we have probably the oldest
computers in the Federal Government are found at the Patent
Office. There have been a number of comments on that by Mr.
David Kappos, who is the Director of the US PTO.
Another basic principle that we can assume: Anything that
is on the internet can be hacked into, whether it is our IPhone
or whether it is our personal computer, or our IPod that is
connected.
So, we have to assume that the Patent Office is regularly
hacked into and the best information is taken from the Patent
Office. I do not think that has received the attention that it
merits.
The second thing that happens in talking to computer
security experts, and I have done this for a couple of books,
is the first thing that a foreign intruder seeks is to identify
the sources of this technology.
If you go into the Patent Office, or if you just simply
take the published Patent applications, you can narrow down the
fields to those companies that are doing the most advanced
research, large and small. Then once those companies are
identified, the Chinese are particularly effective at doing a
barrage of attacks upon the computer systems of those companies
in an attempt to put in Trojan spyware that will enable them at
the schedule of the intruder to produce the information of the
company itself and literally on an hourly or daily basis, they
know exactly what is going on with the technology or research
there. The issue is one of how do we improve the security of
information in that process.
A second issue that I mention in my testimony relates to
the entire question of the security of economic technology. We
have both national and economic security needs in this country.
We have laws on the books that deal with the national security,
the military technology. We have laws that require the
imposition of secrecy orders. We have no such laws on economic
technology. And increasingly what has happened over the years
is we have dual technologies that are used for both purposes.
In the back of my testimony I have a table that I would
direct your attention to on the number of secrecy orders that
have been given. It's the fifth column over.
And what we see in during the Cold War era we would have
hundreds of items each year that would be put under a secrecy
order. A patent would be given, but the secrecy would not be
allowed. That rate has declined by about 90 percent in recent
years.
Last year there were 86 secrecy orders issued at the Patent
Office. Of those, about 60 were from the National Labs and
dealt with atomic issues. There were about 26 John Doe secrecy
orders imposed.
Now here's the problem. We have the Department of Commerce,
the Department of Defense, Department of State, Homeland
Security imposing export controls on certain technologies
because we do not want people who might be hostile to us to
have that technology. At the same time, we are putting up
through the Patent Office on the internet the patent
applications and the full patent itself which includes the best
mode for the best way to make it. So simultaneously we are
losing billions of dollars of sales and we have absolutely no
security benefit from that.
So, I think this is a very rich area of study of how do we
take our national security and recognize the dual use
technologies? How do we make sure that we have an improved
security inside the Patent Office on this publication of
materials?
Thank you, and I look forward to your questions later.
[The prepared statement of Mr. Choate follows:]
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Mr. Rohrabacher. Thank you very much, Mr. Choate. And
appreciate you keeping it within 5 minutes, and we will have a
longer session to ask questions and answers after that.
Mr. Fisher?
STATEMENT OF MR. RICHARD FISHER, SENIOR FELLOW, ASIAN MILITARY
AFFAIRS, INTERNATIONAL ASSESSMENT AND STRATEGY CENTER
Mr. Fisher. Chairman Rohrabacher, I would like to begin by
thanking you for your consistent leadership in helping to alert
this nation to the threat from China's Communist Party. And
Chairman Carnahan and other members, I would like to extend my
thanks to you for holding this hearing today.
Both the internet and the dual use technologies that I will
cover in my remarks have helped to propel a far more globalized
world economy which has produced myriad benefits, has many
defenders, but I would also submit, Mr. Chairman, that it is
time for the United States to devise new defenses against those
who are exploiting these benefits and harming of the security
of the United States.
In my testimony one of the major points that I make is to
highlight the cost of China's cyber warfare against this
country. I have provided some figures in a PowerPoint slide and
that looks at, at least, open source estimates of annual
expenditures. And last year I found an estimate that describes
the cost of just cyber-espionage alone as mounting to almost
$200 billion a year. This is comparable to what the United
States is spending to defend ourselves or what is the cost of
the impact of the war against in this hemisphere.
Admiral Winnefeld just 3 days ago provided the figure of
$181 billion as he impact on this country of the war on drugs.
So with that level of importance, that level of comparison,
I think a far greater degree of public focus needs to be placed
on this challenge of Chinese cyber warfare.
In my testimony I describe some points about the order of
battle that PLA has put together, how cyber warriors or drawn
from the criminal sector, from the computer industry. You
mentioned the Reuters story today that described a U.S. Embassy
cable that has traced attacks back to a specific unit in
Chengdu. The Chinese have a cyber army that is fully integrated
into their order of battle. What we need to do to defend
ourselves is another long and complex subject, but at minimum
we need to consider how we can raise this issue in importance
in terms of the information that we share with American
citizens.
Every year at the Pentagon, because of the Congress, has to
print a report about PLA modernization, Chinese military
modernization. I believe that we need a similar report that
highlights China's cyber war against the United States and all
other democracies.
Now I'd like to move on to looking at how American dual use
technologies are being used by China increasingly for military
purposes. I have written on this at some length in the past,
and I put together just a few PowerPoint slides that provide
some examples.
Early in the last decade two Chinese companies basically
stole the AM General Humvee and put it into production. One
company, the Dong Feng Motor Company is now producing this
vehicle for the People's Liberation Army and the People's Armed
Police. It's not something that AM General would talk to me
about until just a few years ago. And it apparently is
something that happens with the approval of the Commerce
Department. And it does not appear that there is anyone who is
aware or taking any action to address an American-designed
vehicle being used by the Chinese military.
Another example that I discovered at a Chinese air show in
2004 was that two Boeing 737s have essentially been dragooned
into the People's Liberation Army Air Force. My sources in
another country explained to me soon after that these airplanes
were being used in China's Cruise missile development program.
There are now 400, 500, 600 Cruise missiles appointed at
Taiwan, and this aircraft helped to develop them.
Here we see at the far left the 737s and Chinese electronic
warfare and electronic technology development unit.
Here we have another problem, and that is how China has
integrated the airliners and the cargo liners that we have sold
them into a civilian reserve force that is now helping to
transport PLA troops and forces, and equipment. This is an
exercise that took place in 2008, a U.S. built Boeing 747, a
McDonnell Douglas DC-10 and we see Humvees being arrayed as
part of the forces being transported.
This is an exercise that took place last year. China
Southern Airlines just acquired this Boeing 777F and promptly
went into a mobility exercise.
Finally, there is the problem of how to control academic
research, especially when it has a military use. I included in
my testimony an explanation of the case of a certain professor
who was allowed or invited to be a visiting fellow with a NASA
Laboratory in the late 1980s. She then returned to China with
her information and became a leading expert for China in the
development of composite ceramic matrix materials which are
used to shield spacecraft. And she is now involved in China's
effort to build military spacecraft and military hypersonic
products.
I do not think that there is enough of an awareness or a
willingness on the part of those who should be defending our
technology, and that would be my final point, sir.
Thank you very much.
[The prepared statement of Mr. Fisher follows:]
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Mr. Rohrabacher. Thank you very much, Mr. Fisher. We will
get back to you during the questions and answer. But it appears
that we are spending a lot of money on research and development
here and maybe the benefit is going overseas. But we will let
our next witnesses comment on that as well.
Mr. Timperlake?
STATEMENT OF THE HONORABLE EDWARD TIMPERLAKE (FORMER DIRECTOR,
TECHNOLOGY ASSESSMENT, INTERNATIONAL TECHNOLOGY SECURITY,
OFFICE OF THE SECRETARY OF DEFENSE, U.S. DEPARTMENT OF DEFENSE)
Mr. Timperlake. Thank you very much, Mr. Chairman,
distinguished members.
I would like to submit my testimony for the record and
summarize briefly.
The 106th Congress of the First Session reported out a
bipartisan document that is a tribute to the fact that the U.S.
Congress in national security concerns come together as one, it
was called the Cox Report. It was a report on the activities of
the People's Republic of China. I linked it in my testimony.
Anybody that reads that can go to the Congressional Web site or
buy a copy on Amazon. Read it, look at today's headlines to
check and see the lineage of what they went after and where it
is today. I picked three quick examples.
In the '90s, the People's Republic of China targeted
ballistic missiles. Sure enough, they also proliferate, by the
way. Boom goes the dynamite on January 11, 2007 they
successfully kinetically killed one of their satellites. Some
day that may be seen as the precursor to the opening round of a
quasi-war in space.
They went after high performance computers. I looked that
up, and in 1999/2000 I think Saudi Arabia and Portugal were
ahead of China, we had the top nine out of the ten, Japan was
closing. And again on 20 October the BBC announced that China
now has the top super computer in the world. So, they got that
one.
Stealth and composite technology, they went after that.
Sure enough, as you mentioned, they rolled out the J-20
Annihilator and embarrassed everybody. Previous to that the
Russians flew their F-22ski, the TF-50. Both of them were a
test flight that caught several by surprise. Three Air Force
officers did not see it that way, General Corely U.S. Air
Force, Lieutenant General Deptula of the Air Force Head of
Intelligence, and General Thomas McInerney. Unfortunately, the
F-22 was stopped at 187 Raptors, and I think that was a
strategic blunder which tell us we have to protect the F-35 at
all cost because that is our ace in the hole coming in combat
maneuvering in the future.
Concurrently while the Chinese were spying, they did the
``Revolution in Military Affairs,'' they saw Andrew Marshall
publish this great document in which Mr. Marshall, director of
Net Assessment, said here was two evolutionary technologies:
Precision-guided munitions and remote sensors, and information
war.
The Chinese military literature tells us in the late '90s
they were giving doctorates in information war. The term
``cyber'' had not been in vogue at that time, so they really
got off the dime very quickly on that.
I would argue though, and we will discuss this, that the
PRC actually has two cyber enemies. They have the free world
for whatever they can get, and the other one is their own
people. And they are very concerned about that, so that
compounds their problem and is an area that we can exploit.
There are two case studies I presented. The first one was
the Varyag, the aircraft carrier, that's denial and deception.
They sent a team over to buy it, it was a cold war relic. And
they claimed that they were purchasing an aircraft carrier to
be a casino Macau. They got though the Turkish Straits of the
Bosphorus by that cover story. Sure enough, very recently
Xinhua is on saying ``The huge warship on the verge of fitting
out, is fulfilling 70 years of China's dreams for an aircraft
carrier.'' I would say that basically they named it the Shi
Lang after the Ming Dynasty admiral. I'd rather call it the
Casino, because that's how they said hey were going to use it.
The other case is they send bad things to bad people.
Whenever the Chinese Government gets something, they have a 16
character policy which says: We get it, we filter it through
the use and the need for the state. And in doing so it's a
brilliant strategy. They then perfect it and balance it by
proliferation. I went to Iraq, I looked at all the Chinese
weaponry that were oil for food violations, and sure enough I
listed them in my report. In addition, Huawei a Chinese firm
was in pre-war Iraq, post-war Iraq. And I was looking at the
CPA, I was engaged with that. I noticed on the Web site they
were bragging that they had gotten into Iraq and basically that
was prohibited. In my personal opinion Huawei is an ongoing
criminal operation as much as anything.
How are we doing and what are we doing about it? The
Justice Department formed up a task force in 2007 to focus on
this. They have done a magnificent job. I give a link to that.
I even gave some of their press releases on spy cases they have
busted, and they really are making these cases.
Finally, the issue of cyber security; it's a black swan
event, which is a great book. Basically, expect the unexpected,
the highly improbable. And we formed up the U.S. Cyber Command.
I want to give Mike Wynne a credit to his vision, the Billy
Mitchell of our generation. He saw the need early with the U.S.
Air Force Cyber Command that melded into the bigger cyber
command picture.
I really do believe that we as Americans have a challenge
but we will, because of hearings like this, address that
challenge.
Thank you, sir.
[The prepared statement of Mr. Timperlake follows:]
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Mr. Rohrabacher. Thank you very much for your testimony.
And now Dr. Segal.
STATEMENT OF ADAM SEGAL, PH.D., SENIOR FELLOW, COUNCIL ON
FOREIGN RELATIONS
Mr. Segal. Mr. chairman and members of the committee, thank
you very much for asking me to testify on this very important
subject.
I would like to place cyber-espionage in a larger context,
which is a push on the Chinese for extremely techno-nationalist
technology policy driven toward reducing dependence on advanced
countries for foreign technology, and particularly reducing
dependence on the United States and Japan. That policy was
enshrined in the 2006 Medium-to Long-Term Science and
Technology Development Plan, introduced the idea of
``indigenous innovation,'' and it set the goal for China to
become an innovated-oriented society by 2020 and among the
world's scientific and technology leaders by 2050.
The pursuit of these goals follows three tracks. The first
track is industrial policy, which is basically a top-down,
state-led focus on big science, but also includes the use of
standards policy, the use of procurement and the failure to
protect intellectual property rights, as well as forcing
technology transfer between foreign companies that want access
to the Chinese domestic market.
The second strand is what you would call innovation
strategy, and this is a much more market-oriented focus on
creating technological entrepreneurship and new growth in the
Chinese economy.
And the third strand is cyber-espionage and traditional
espionage.
These three strands clearly are overlapped and intertwined,
although plucking out the individual strands is difficult to
do. In some cases it's very easy. We can see private companies
as they grow larger begin to accept funding and support from
the state. And also in the case of cyber-espionage as the
``Shadows in the Cloud'' report shows that there is a nexus
between criminal and state hackers and the information that
those hackers find sometimes shows up on the black market and
other times it seems to work its way back to state
institutions.
The question for the United States, of course, is how do
you respond to this? And I think the most important response is
domestically: How do we defend our own networks? How do we move
to risk management? Because I think most of this is in the end
is going to be very difficult to protect, and so we have to
think about what type of information we actually want to be
digitalized and placed on networks. But also, how do we raise
the cost for Chinese hackers, and that's probably going to
involve some forms of active defense.
But I think the larger issue as well is: What are U.S.
companies saying about this problem? Because like with
intellectual property rights theft, U.S. companies do not like
to talk about when they have been hacked. We saw with the
Google hack, Google said 30 other companies were attacked in
this hacking, but then no other company publicly stated that,
yes, this was a problem for us. And I think the reasons that
they do not state it is because they are afraid of retribution
from the Chinese Government. So the United States has to figure
out how are you going to respond to that problem and get U.S.
Government more involved.
And then the third area, I think, is how do we shape this
debate within China. Because we can see with the technology
policy there is, in fact, people who question the wisdom of
this--excuse me this technology policy, this top-down state
strategy. They think that that is not going to be successful
long-term and they are afraid that in fact China will fall
further and further behind. That Chinese standards will only
cut them off from the rest world.
And as Chinese technology companies themselves become more
global, they have a stake in a digital infrastructure that is
more open and more global. So what the United States wants to
do is to think about how we strengthen those individual units.
I suspect, although I have no evidence, that those same
factions, we can call them the innovation strategy factions,
are also suspicious of a technology policy that is based on
espionage. Copying is not going to create incentives for
innovation. So those people are the ones that we want
strengthen, those are the ones we want to convince that they
have an interest in these global structures and these open
infrastructures, and to convince them that China is
increasingly becoming more vulnerable to cyber-attacks itself.
This is not going to be easy. The techno-nationalist view
is widespread in China. It is, in fact, held by the innovation
strategy faction. They also want to reduce dependence on the
West, but they at least are pushing in more open ways of doing
it. So that I think it is important to engage the Chinese on
that front, but the more important short-term is probably going
to be defending ourselves and raising costs to Chinese hackers.
I'll stop there.
[The prepared statement of Mr. Segal follows:]
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Mr. Rohrabacher. Thank you very much.
And Mr. Carnahan may not be able to join us after the next
series of votes, so I think we will give you the courtesy of
asking your questions now.
Mr. Carnahan. Great. Thank you, Mr. Chairman. And thanks to
all the panels here today. This has been a very good overview.
I wanted to start with just an overall question to really
any of the panelists that want to weigh in on this. President
Obama had stated that ``our ability to partner is a
prerequisite for progress on many of the most pressing global
challenges.'' I wanted to get your assessment of the
willingness of the Chinese to engaged with the U.S. in this
manner regarding cyber threats and technology threats. And why
do we not just start with Mr. Choate and work our way across?
Mr. Choate. Well, I think we can anticipate--well I think I
can start by looking at our own history. From 1790 to around
1838 the United States was under a very aggressive policy of
technology acquisition under a manufacturing strategy put
together by Alexander Hamilton. We literally stole everything
that we could from any place in the world.
And I think that China, and any other developing country,
would feel an obligation to do almost the same thing. From our
perspective I think we must assume that for years to come as
long as our technology is superior, they have ever incentive in
the world to go out and steal our technology. That gives a
series of mandates on what we should do as a country.
We should be not naive. We should take a look at the way
that we have agglomerated technology, who has access to it, how
we in effect have our companies understand that one of the
things they've got do is take certain of their computers off of
the internet. We need to take a look at our policies with the
Patent Office with all of the new technologies there. In other
words, we must assume as a policy that not only China, but
Germany and Brazil and other countries are out to steal to our
technology. It's our responsibility to not make it easy as we
do now.
Mr. Carnahan. And before I get to the next witness, to the
extent that China is becoming a target increasingly of
intellectual property----
Mr. Choate. Yes.
Mr. Carnahan [continuing]. Is that going to get them to the
table on these issues?
Mr. Choate. Not really, I don't think so.
One of the things that is happening with the Chinese, they
have made in their last 5-year plan a major effort to do
patenting in China. Probably the largest set of patenting in
the world now is done inside China. So their conscious about
the need to create legal rights and at the same time they're
conscious about securing their own technology. So I do not
think that we're really going to wind up with any real
cooperations. I think we must proceed on that basis.
Mr. Carnahan. Thank you. I am going to try to get everybody
in if we can after this bell went off.
Mr. Fisher?
Mr. Fisher. Thank you, Mr. Chairman.
I do not see that the Chinese Government today shares any
interest in partnering with the United States in an effective
way, at least as we would view it. The cyber warfare effort
along with the range of miliary modernization efforts that we
have seen underway all date back to the 1989 Tiananmen
uprising. That scared the bejesus out of the Chinese Communist
leadership. And all that they have done since then in the
military strategic sphere has been devoted to protecting their
dictatorship, their control, their position of power to include
this aggressive campaign of cyber warfare.
They are not going to be interested in talking to us until
they have reached a level of power for which they are
comfortable. And I am not sure that their concepts of
partnering will include any kind of concept of equality that we
have, that we will share interests and then move forward. Once
they gain a position of superiority, they are going to want to
start dictating and changing the rules, rewriting rules.
Mr. Carnahan. Let me move on to Mr. Timperlake.
Mr. Timperlake. Yes, sir. Thank you for the question.
I think you have to approach it from two perspectives. The
first is they are very good at denial and deception, which is
their charm offensive. They will stay engaged and do whatever
accrues to their advantage. No problem, no debate on that. What
they will do, though, is take it to their advantage first and
foremost through their 16 character policy. Where I think you
can actually find their true intentions is if you read their
War College literature. Surprisingly, or not surprising, the
Chinese will tell you, the PLA, what their intentions are. In
fact, they are quite proud of what they are doing.
So the engagement policy always has to go in with that huge
caveat that they are very, very good, as you saw, taking an
aircraft carrier and calling it a casino, and then converting
it into a ship of war. So when you engage at that level be
careful.
Mr. Carnahan. Mr. Segal?
Mr. Segal. I do not fundamentally disagree with most of the
bad news that the panelists have given you, but I will try to
give a glimmer of hope here.
On one hand, I think there are some parts of the Chinese
bureaucracy that are beginning to think about how they defend
themselves from these vulnerabilities. We see a track now that
is going on with some members of the Ministry of State Security
and MIIT that are participating on these discussions.
At the U.N. the Chinese have unwillingly gone along with
the Russians for discussions about cyberspace arms control
agreements.
And in my own dealings with members of the Ministries, they
are beginning to practice certain arguments, rule them out
about how they want to engage in cyberspace.
I think it is very early. I am not expecting any progress
on those fronts, but I think within the Chinese bureaucracy
there is some thinking about it. But I do not widely disagree
with the generally negative that the panel has given.
Mr. Carnahan. Great. Thanks to all of you.
Thank you, Mr. Chairman., Yield back.
Mr. Rohrabacher. Thank you.
How many minutes do we have? We have 10 more minutes to get
to the vote, and I think what I am going to do is get my
questions now and seeing that our other members are not here,
that will be the end of the hearing. So, we do have 10 minutes.
So if you would like to any moment, because we are
restricted here, you can jump in and ask a follow-up question
as well, Mr. Carnahan.
What about joint ventures with Chinese companies? We have
aerospace industry and others who are pushing in that area. Is
this going to work for us or against us? And be succinct and we
will go on down?
Mr. Choate. Basically what we are doing is giving away our
technology.
Mr. Rohrabacher. And so the things that we have developed
and spent billions of dollars developing will then be
eventually used competitively against us?
Mr. Choate. Yes.
Mr. Rohrabacher. Mr. Fisher?
Mr. Fisher. Absolutely, I agree with Pat on this.
We are helping the Chinese to build competitors to Boeing
and Airbus, and that advantage will be much narrower by the end
of this decade. And the Chinese are taking all of this
technology and applying it to military programs that will be
largely aimed at us as well.
Mr. Rohrabacher. This policy has destroyed several
manufacturing industries in the United States already. And for
us to put at risk the aerospace industry with this type of
involvement, would the Chinese who are clearly our adversaries,
certainly more than just our competitors but our adversaries
and perhaps our enemies? Mr. Timperlake?
Mr. Timperlake. Yes, sir, I think you are exactly right. In
fact, one dimension of the role out of the J-20 that catches my
interest is they are notorious proliferators. So in addition to
perfecting a fifth generation aircraft, you can expect them to
try and sell a fifth generation aircraft. And that will intrude
on the international aircraft market to their benefit. So they
steal stuff, they build something and they proliferate it and
they do it for money, or they will buy their way in. And they
are very good at that.
Mr. Rohrabacher. Mr. Segal?
Mr. Segal. Clearly in aerospace and avionics the joint
ventures are probably not going to be good for U.S. national or
economic security interests. But I think in a range of other
economic sectors companies have moved away from the joint
venture model because of the technology transfer reason. They
have moved to wholly foreign-owned ventures and not wanting to
partner for this technology transfer reason. And they
themselves have become gradually over time more sophisticated
in breaking up technology into specific components and making
sure that the most advanced components do not go into China.
But I think for national security reasons there are certain
sectors that do.
Mr. Rohrabacher. Of course, it is not necessarily what goes
into China physically, but----
Mr. Segal. Yes.
Mr. Rohrabacher [continuing]. Perhaps what the Chinese can
hack into and bring the plans over.
Mr. Fisher, you had something you wanted to add?
Mr. Fisher. ...is important as well, because in my opinion,
at least what some Chinese sources have told me, they have
their own F-35 program as well. A lower cost fighter, fifth
generation fighter that, as Mr. Timperlake mentioned, will be
on the market probably within the decade.
Mr. Rohrabacher. And is that based on our research and
development, Mr. Timperlake?
Mr. Timperlake. It is an important point. What I found in
my research is that the Chinese acquisition system which we
still are trying to figure out, we have trouble with our own of
course, is develop, develop, steal, develop, steal, buy,
develop; whatever. But what happens is they go dark for a
period 5 to 7 years so they can surprise you.
And if they laid out the J-20 as more a surprise then
anything, what is next, and what is next is cascading in from
the great spy cases of the '90s and those cyber intrusion to
this day. So, there are surprises still coming in their
perfection of technology.
Mr. Rohrabacher. We have a major economic challenge before
us. And I would suggest that from the testimony we hear today a
considerable amount of that challenge can be traced to the fact
that we now have permitted in wealth in the form of research
and technology development to be stolen or just transferred to
a competitor.
Yes, Pat?
Mr. Choate. The problem really extends across our advanced
technology trades. Department of Commerce does an analysis. We
are running an $80-billion-a-year deficit in advanced
technology trade. The largest part of that deficit is now with
China.
I think that what we have to be leery about is that the
Chinese on certain technologies, once they gain control of
those, they will use that as they have their control of 90
percent of the world's rare earths as strategic leverage,
foreign policy leverage. Our risk is that we become totally
dependent upon China or the countries immediately around China,
in the China sphere those ten countries for certain of our most
vital technologies. And we are well on the way of having such a
dependency.
Mr. Rohrabacher. Well, let me just note that we are going
to break in a few minutes. So, I am sorry, I apologize for that
but this is the way it has worked out today.
We face many challenges as a free people. One is how are we
going to be prosperous and our people are going to have a
decent standard of living. And number 2, of course, and which
is probably the number one concern, is how are we going to make
sure that we are safe from threats to our security and the
safety of our people. And in both of these goals that should be
primary goals of the Federal Government, the transfer of
technology and the cyber theft of American technology is
putting our ability to have a prosperous and have a safe
American, it is putting that at risk. This is an issue that I
am pretty happy this is one of the first things we covered in
this subcommittee. We will be coming back to that and probably
asking you gentlemen to return in a few months. But we have
broken the ground here. And we want to make sure that we have a
national debate on where we draw the line.
I would say the American people would be outraged to
understand that tens of billions of dollars that have been
taken from them in order for research and development in our
country has ended up in the hands of an economic and military
adversary like Communist China, which is also one of the
world's worst human rights abusers.
So, if we are going to preserve the peace and we are going
to have prosperity in America, we have got to come to grips
with this challenge.
I have got to come to grips because I have got 3\1/2\
minutes left to vote.
I would like to thank you all for testifying.
This hearing is adjourned.
[Whereupon, at 1:01 p.m., the subcommittee was adjourned.]
A P P E N D I X
----------
Material Submitted for the Hearing Record Notice
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
Minutes
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|